Login / Signup
Security Analysis of Role-Based Access Control through Program Verification.
Anna Lisa Ferrara
P. Madhusudan
Gennaro Parlato
Published in:
CSF (2012)
Keyphrases
</>
security analysis
role based access control
access control
access control policies
security requirements
security model
public key
conflict resolution
multi domain
data security
security policies
smart card
fine grained
distributed environment
security mechanisms
security issues
information systems
sensor networks